CVE-2025-9293
EUVD-2025-20752213.02.2026, 02:16
A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| tp-link | aginet | 𝑥 < 2.13.6 |
| tp-link | deco | 𝑥 < 3.9.163 |
| tp-link | festa | 𝑥 < 1.7.1 |
| tp-link | kasa | 𝑥 < 3.4.350 |
| tp-link | kidshield | 𝑥 < 1.1.21 |
| tp-link | omada | 𝑥 < 4.25.25 |
| tp-link | omada_guard | 𝑥 < 1.1.28 |
| tp-link | tapo | 𝑥 < 3.14.111 |
| tp-link | tether | 𝑥 < 4.12.27 |
| tp-link | tp-partner | 𝑥 < 2.0.1 |
| tp-link | tpcamera | 𝑥 < 3.2.17 |
| tp-link | vigi | 𝑥 < 2.7.70 |
| tp-link | wi-fi_navi | 𝑥 < 1.5.5 |
| tp-link | wifi_toolkit | 𝑥 < 1.4.28 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration